-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpapers.bib
More file actions
353 lines (301 loc) · 13.8 KB
/
papers.bib
File metadata and controls
353 lines (301 loc) · 13.8 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
---
---
@inproceedings{bioharm,
title={Biosignal Authentication Considered Harmful Today},
author={Krish, Veena and Paoletti, Nicola and Kazemi, Milad and Smolka, Scott and Rahmati, Amir},
booktitle={USENIX Security Symposium (USENIX Sec)},
month=8,
year={2024}
}
@inproceedings{rose_glasses,
title={Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML Attacks},
author={Eykholt, Kevin and Ahmed, Farhan and Vaishnavi, Pratik and Rahmati, Amir},
booktitle={USENIX Security Symposium (USENIX Sec)},
month=8,
year={2024}
}
@inproceedings{zero-one_attack,
title={Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations},
author={Bak, Stanley and Bogomolov, Sergiy and Hekal, Abdelrahman and Krish, Veena and Mata, Andrew and Rahmati, Amir},
booktitle={International Conference on Cyber-Physical Systems (ICCPS)},
month=5,
year={2024}
}
@inproceedings{koopman_falsification,
title={Falsification using Reachability of Surrogate Koopman Models},
author={Bak, Stanley and Bogomolov, Sergiy and Hekal, Abdelrahman and Kochdumper, Niklas and Lew, Ethan and Mata, Andrew and Rahmati, Amir},
booktitle={ACM International Conference on Hybrid Systems: Computation and Control (HSCC)},
month=5,
year={2024}
}
@inproceedings{youtube_cryptoscam,
title={Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms},
author={Li, Xigao and Rahmati, Amir and Nikiforakis, Nick},
booktitle={Network and Distributed System Security Symposium (NDSS)},
month=2,
year={2024}
}
@article{provable_noise,
title={Provable Observation Noise Robustness for Neural Network Control Systems},
author={Krish, Veena and Mata, Andrew and Hobbs, Kerianne and Bak, Stanley and Rahmati, Amir},
journal={Research Directions: Cyber-Physical Systems},
month=11,
year={2023}
}
@article{icdinjection,
title={Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs},
author={Krish, Veena and Paoletti, Nicola and Smolka, Scott A. and Rahmati, Amir},
journal={IEEE Access},
year={2023}
}
@inproceedings{erebus,
title={Erebus: Access Control for Augmented Reality Systems},
author={Goutam, Sanket and Kim, Yoonsang and Rahmati, Amir and Kaufman, Arie},
booktitle={USENIX Security Symposium (USENIX Sec)},
year={2023}
}
@inproceedings{scannerscope,
title={Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning},
author={Li, Xigao and Azad, Babak Amin and Rahmati, Amir and Nikiforakis, Nick},
booktitle={The Web Conference (WWW)},
year={2023}
}
@inproceedings{crt,
author = {Vaishnavi, Pratik and Eykholt, Kevin and Rahmati, Amir},
booktitle = {Advances in Neural Information Processing Systems},
title = {Accelerating Certified Robustness Training via Knowledge Transfer},
year = {2022}
}
@inproceedings{rrm,
title={Transferring Adversarial Robustness Through Robust Representation Matching},
author={Vaishnavi, Pratik and Eykholt, Kevin and Rahmati, Amir},
booktitle={USENIX Security Symposium (USENIX Sec)},
year={2022}
}
@inproceedings{compress_cert,
title={On the Feasibility of Compressing Certifiably Robust Neural Networks},
author={Vaishnavi, Pratik and Krish, Veena and Ahmed, Farhan and Eykholt, Kevin and Rahmati, Amir},
booktitle={Workshop on Trustworthy and Socially Responsible Machine Learning (TSRML)},
year={2022}
}
@inproceedings{ares,
title={Ares: A System-Oriented Wargame Framework for Adversarial ML},
author={Ahmed, Farhan and Vaishnavi, Pratik and Ekyholt, Kevin and Rahmati, Amir },
booktitle={IEEE Security and Privacy Workshops (SPW)},
year={2022}
}
@inproceedings{goodbotbadbot,
title={Good bot, bad bot: Characterizing automated browsing activity},
author={Li, Xigao and Azad, Babak Amin and Rahmati, Amir and Nikiforakis, Nick},
booktitle={IEEE symposium on security and privacy (S\&P)},
year={2021}
}
@inproceedings{ar_privacy,
title={Design of Privacy Preservation System in Augmented Reality},
author={Kim, Yoonsang and Boorboor Saeed and Rahmati, Amir and Kaufman, Arie},
booktitle={IEEE Symposium on Visualization for Cyber Security (VizSec)},
year={2021}
}
@inproceedings{viscr,
title={An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures},
author={Nagendra, Vasudevan and Bhattacharya, Arani and Yegneswaran, Vinod and Rahmati, Amir and Das, Samir},
booktitle={The Web Conference (WWW)},
year={2020}
}
@inproceedings{valve,
title={Valve: Securing Function Workflows on Serverless Computing Platforms},
author={Datta, Pubali and Kumar, Prabuddha and Morris, Tristan and Grace, Michael and Rahmati, Amir and Bates, Adam},
booktitle={The Web Conference},
year={2020}
}
@article{attentionmask,
title={Can Attention Masks Improve Adversarial Robustness?},
author={Vaishnavi, Pratik and Cong, Tianji and Eykholt, Kevin and Prakash, Atul and Rahmati, Amir},
journal={Workshop on Engineering Dependable and Secure Machine Learning Systems (EDSMLS)},
year={2020}
}
@article{model-agnostic-arxiv,
title={Towards Model-Agnostic Adversarial Defenses using Adversarially Trained Autoencoders},
author={Vaishnavi, Pratik and Eykholt, Kevin and Prakash, Atul and Rahmati, Amir},
journal={arXiv preprint arXiv:1909.05921},
year={2019}
}
@inproceedings{wearsys19,
title={Protecting Visual Information in Augmented Reality from Malicious Application Developers},
author={Jensen, Jk and Hu, Jinhan and Rahmati, Amir and LiKamWa, Robert},
booktitle={ACM Workshop on Wearable Systems and Applications (WearSys)},
year={2019}
}
@inproceedings{difttt,
title={Decentralized action integrity for trigger-action IoT platforms},
author={Fernandes, Earlence and Rahmati, Amir and Jung, Jaeyeon and Prakash, Atul},
booktitle={USENIX Network and Distributed System Security Symposium (NDSS)},
year={2018}
}
@inproceedings{roadsign,
title={Robust physical-world attacks on deep learning visual classification},
author={Eykholt, Kevin and Evtimov, Ivan and Fernandes, Earlence and Li, Bo and Rahmati, Amir and Xiao, Chaowei and Prakash, Atul and Kohno, Tadayoshi and Song, Dawn},
booktitle={IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
year={2018}
}
@inproceedings{objdetector,
title={Physical adversarial examples for object detectors},
author={Eykholt, Kevin and Evtimov, Ivan and Fernandes, Earlence and Li, Bo and Rahmati, Amir and Tram{\`e}r, Florian and Prakash, Atul and Kohno, Tadayoshi and Song, Dawn},
booktitle={USENIX Workshop on Offensive Technologies (WOOT)},
year={2018}
}
@inproceedings{attention,
title={ATtention Spanned: Comprehensive Vulnerability Analysis of $\{$AT$\}$ Commands Within the Android Ecosystem},
author={Tian, Dave Jing and Hernandez, Grant and Choi, Joseph I and Frost, Vanessa and Raules, Christie and Traynor, Patrick and Vijayakumar, Hayawardh and Harrison, Lee and Rahmati, Amir and Grace, Michael},
booktitle={USENIX Security Symposium (USENIX Sec)},
year={2018}
}
@inproceedings{tyche,
title={Tyche: A risk-based permission model for smart homes},
author={Rahmati, Amir and Fernandes, Earlence and Eykholt, Kevin and Prakash, Atul},
booktitle={IEEE Cybersecurity Development (SecDev)},
year={2018}
}
@inproceedings{heimdall,
title={Heimdall: A Privacy-Respecting Implicit Preference Collection Framework},
author={Rahmati, Amir and Fernandes, Earlence and Eykholt, Kevin and Chen, Xinheng and Prakash, Atul},
booktitle={International Conference on Mobile Systems, Applications, and Services (MobiSys)},
year={2017}
}
@article{objdetector-arxiv,
title={Note on attacking object detectors with adversarial stickers},
author={Eykholt, Kevin and Evtimov, Ivan and Fernandes, Earlence and Li, Bo and Song, Dawn and Kohno, Tadayoshi and Rahmati, Amir and Prakash, Atul and Tramer, Florian},
journal={arXiv preprint arXiv:1712.08062},
year={2017}
}
@inproceedings{iotpermsec,
title={The Security Implications of Permission Models of Smart Home Application Frameworks},
author={Fernandes, Earlence and Rahmati, Amir and Jung, Jaeyeon and Prakash, Atul},
booktitle={IEEE Security and Privacy},
year={2017}
}
@inproceedings{rehash,
title={Internet of things security research: A rehash of old ideas or new intellectual challenges?},
author={Fernandes, Earlence and Rahmati, Amir and Eykholt, Kevin and Prakash, Atul},
booktitle={IEEE Security and Privacy},
year={2017}
}
@inproceedings{ifttt-vs-zapier,
title={IFTTT vs. Zapier: A comparative study of trigger-action programming frameworks},
author={Rahmati, Amir and Fernandes, Earlence and Jung, Jaeyeon and Prakash, Atul},
booktitle={arXiv preprint arXiv:1709.02788},
year={2017}
}
@inproceedings{contexiot,
title={{ContexIoT}: Towards Providing Contextual Integrity to Appified IoT Platforms},
author={Yunhan Jack Jia and Qi Alfred Chen and Shiqi Wang and Amir Rahmati and Earlence Fernandes and Z. Morley Mao and Atul Prakash},
booktitle={USENIX Network and Distributed System Security Symposium (NDSS)},
year = {2017}
}
@inproceedings{flowfence,
title={{FlowFence}: Practical Data Protection for Emerging {IoT} Application Frameworks},
author={Fernandes, Earlence and Paupore, Justin and Rahmati, Amir and Simionato, Daniel and Conti, Mauro and Prakash, Atul},
booktitle={USENIX Security Symposium (USENIX Sec)},
year={2016}
}
@inproceedings{opacified_comp,
title={Applying the Opacified Computation Model to Enforce Information Flow Policies in {IoT} Applications},
author={Rahmati, Amir and Fernandes, Earlence and Prakash, Atul},
booktitle={IEEE Cybersecurity Development Conference (SecDev)},
year={2016}
}
@inproceedings{opinion_repo,
title={Towards Comprehensive Repositories of Opinions},
author={Han Zhang and Kasra Edalat-Nejad and Amir Rahmati and Harsha V. Madhyastha},
booktitle={ACM Workshop on Hot Topics in Networks (HotNets)},
year={2016}
}
@inproceedings{flash_storage,
title={Approximate Flash Storage: A Feasibility Study},
author={Rahmati, Amir and Hicks, Matthew and Prakash, Atul},
booktitle={ASPLOS Workshop on Approximate Computing Across the System Stack (WAX)},
year={2016}
}
@inproceedings{tardisJournal,
title={Persistent Clocks for Batteryless Sensing Devices},
author={Hester, Josiah and Tobias, Nicole and Rahmati, Amir and Sitanayah, Lanny and Holcomb, Daniel and Fu, Kevin and Burleson, Wayne P and Sorber, Jacob},
booktitle={Transactions on Embedded Computing Systems (TECS)},
year={2016}
}
@inproceedings{earlenceoakland,
title={Security Analysis of Emerging Smart Home Applications},
author={Fernandes, Earlence and Jung, Jaeyeon and Prakash, Atul},
booktitle={IEEE Symposium on Security and Privacy (S\&P)},
year={2016}
}
@article{drvfpJournal,
title={Reliable physical unclonable functions using data retention voltage of sram cells},
author={Xu, Xiaolin and Rahmati, Amir and Holcomb, Daniel E and Fu, Kevin and Burleson, Wayne},
journal={IEEE Transactions on CAD: Special Section on Hardware Security and Trust (TCAD)},
year={2015},
}
@inproceedings{contextAC,
title={Context-Specific Access Control: Conforming Permissions With User Expectations},
author={Rahmati, Amir and Madhyastha, Harsha V},
booktitle={ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
year={2015},
}
@inproceedings{probable_cause,
title={{Probable Cause}: The deanonymizing effects of approximate {DRAM}},
author={Rahmati, Amir and Hicks, Matthew and Holcomb, Daniel E and Fu, Kevin},
booktitle={ACM International Symposium on Computer Architecture (ISCA)},
year={2015},
}
@inproceedings{refreshdram,
title={Refreshing thoughts on {DRAM}: Power saving vs. data integrity},
author={Rahmati, Amir and Hicks, Matthew and Holcomb, Daniel and Fu, Kevin},
booktitle={ASPLOS Workshop on Approximate Computing Across the System Stack (WACAS)},
year={2014}
}
@inproceedings{stateRepression,
title={Cyber Dimentions of State Repression},
author={Meredith Blank, Anita Ravishankar, Amir Rahmati},
booktitle={Cyber Conflict Project Report},
year={2014}
}
@inproceedings{insiderLeaks,
title={Under What Circumstances Are Insider Leaks Justified?},
author={Ben Lusher, Kathryn Reeves, Amir Rahmat},
booktitle={Cyber Conflict Project Report},
year={2014}
}
@inproceedings{saiwork,
title={Malware Prognosis: How to Do Malware Research in Medical Domain},
author={Gouravajhala, Sai R. and Rahmati, Amir and Honeyman, Peter and Fu, Kevin},
booktitle={USENIX Workshop on Health Information Technologies (Health Tech)},
year={2014}
}
@inproceedings{wattsupdoc,
title={{WattsUpDoc}: Power side channels to nonintrusively discover untargeted malware on embedded medical devices},
author={Clark, Shane S and Ransford, Benjamin and Rahmati, Amir and Guineau, Shane and Sorber, Jacob and Xu, Wenyuan and Fu, Kevin},
booktitle={USENIX Workshop on Health Information Technologies (Health Tech)},
year={2013}
}
@inproceedings{irancensor,
title={Internet censorship in {Iran}: A first look},
author={Rahmati, Amir and Aryan, Homa and Halderman, J Alex},
booktitle={USENIX Workshop on Free and Open Communications on the Internet (FOCI) [Anonymous Publication]},
year={2013}
}
@inproceedings{drvfp,
title={DRV-Fingerprinting: using data retention voltage of SRAM cells for chip identification},
author={Holcomb, Daniel E and Rahmati, Amir and Salajegheh, Mastooreh and Burleson, Wayne P and Fu, Kevin},
booktitle={Workshop On RFID Security And Privacy (RFIDsec)},
year={2012},
}
@inproceedings{tardis,
title={{TARDIS}: Time and remanence decay in {SRAM} to implement secure protocols on embedded devices without clocks},
author={Rahmati, Amir and Salajegheh, Mastooreh and Holcomb, Dan and Sorber, Jacob and Burleson, Wayne P and Fu, Kevin},
booktitle={USENIX Security Symposium (USENIX Sec)},
year={2012}
}
@misc{EthosLab,
author = {},
title = {Ethos Lab · GitHub},
howpublished = {\url{https://github.com/Ethos-lab}},
}